Sign in

The dummy-based trajectory privacy protection method to resist correlation attacks in Internet of Vehicles.

Qiuling ChenAyong YeZiwen ZhaoJinbo Xiong
Published in: Concurr. Comput. Pract. Exp. (2023)
Keyphrases
  • data sets
  • privacy protection
  • nearest neighbor
  • data collection
  • information loss